Summary
It is possible to obtain a user's NTLM hash by tricking them into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction.
Impact
By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted.
Workarounds
Consider only cloning repositories or fetching branches from people you trust.
References
Summary
It is possible to obtain a user's NTLM hash by tricking them into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction.
Impact
By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted.
Workarounds
Consider only cloning repositories or fetching branches from people you trust.
References